000 06189nam a22006975i 4500
001 978-3-031-05288-0
003 DE-He213
005 20240423125443.0
007 cr nn 008mamaa
008 220516s2022 sz | s |||| 0|eng d
020 _a9783031052880
_9978-3-031-05288-0
024 7 _a10.1007/978-3-031-05288-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aChuat, Laurent.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 4 _aThe Complete Guide to SCION
_h[electronic resource] :
_bFrom Design Principles to Formal Verification /
_cby Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, Peter Müller, Adrian Perrig.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXXI, 656 p. 158 illus., 121 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Security and Cryptography,
_x2197-845X
505 0 _aForeword by Joël Mesot -- Foreword by Fritz Steinmann -- Preface -- How to Read This Book -- Acknowledgments -- Introduction -- I SCION Core Components -- Overview -- Authentication -- Control Plane -- Data Plane. II Analysis of the Core Components -- Functional Properties and Scalability -- Security Analysis -- III Achieving Global Availability Guarantees -- Extensions for the Control Plane -- Monitoring and Filtering -- Extensions for the Data Plane -- Availability Guarantees -- IV SCION in the Real World -- Host Structure -- Deployment and Operation -- SCIONLAB Research Testbed -- Use Cases and Applications -- Green Networking with SCION -- Cryptography -- V Additional Security Systems -- F-PKI: A Flexible End-Entity Public-Key Infrastructure -- RHINE: Secure and Reliable Internet Naming Service -- PILA: Pervasive Internet-Wide Low-Latency Authentication -- VI Formal Verification -- Motivation for Formal Verification -- Design-Level Verification -- Code-Level Verification -- Current Status and Plans.-VII Back Matter -- Related Work -- Bibliography -- Glossary -- Abbreviations -- Index.
520 _aWhen the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.
650 0 _aData protection.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aCloud Computing.
650 0 _aComputers.
650 0 _aSecurity systems.
650 1 4 _aData and Information Security.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aCloud Computing.
650 2 4 _aComputer Hardware.
650 2 4 _aSecurity Science and Technology.
700 1 _aLegner, Markus.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aBasin, David.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aHausheer, David.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aHitz, Samuel.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aMüller, Peter.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aPerrig, Adrian.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031052873
776 0 8 _iPrinted edition:
_z9783031052897
776 0 8 _iPrinted edition:
_z9783031052903
830 0 _aInformation Security and Cryptography,
_x2197-845X
856 4 0 _uhttps://doi.org/10.1007/978-3-031-05288-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c178112
_d178112